CAST Approval For Mobile Payment Applications White Paper V13
2015-01-11
: Mc Cast-Approval-For-Mobile-Payment-Applications-White-Paper-V13 CAST-Approval-for-Mobile-payment-applications-White-paper-v13
Open the PDF directly: View PDF .
Page Count: 8
Download | |
Open PDF In Browser | View PDF |
White Paper: CAST MasterCard CAST Approval Process for Mobile Payment Applications Introduction The CAST (Compliance Assessment & Security Testing) process for Mobile Payment Applications has been improved to take advantage of the online nature of mobile devices and their capability for post issuance download of applications into Secure Elements. This differs slightly to the CAST model for traditional smartcards. It is the intention of this white paper to explain the differences and the new process impact. Summary: CAST Process for Mobile Payment Applications The advent of mobile devices with increased online connectivity has given rise to the ability to modify applications more easily after they are issued. The CAST process has been updated to respond to this industry change. By reviewing the CAST policy on backdating approval issue dates, Mobile payment products that successfully demonstrate state of the art security when full evaluation testing has been performed will be considered as new products, qualifying for a 3 year CAST certificate with a new issue date provided the vendor uses the original evaluation laboratory and the underlying platform is maintained and approved under the EMVCo process. This process is termed a Refresh Evaluation. This change also makes possible the alignment of CAST approval expiry dates across different payment products on the same underlying platform and thus maximises the platform’s time in the field, so removing the conflict over withdrawing the product early because different Apps are loaded at different times. Benefits for Payment Product Developers: Refresh evaluation leads to a new 3 year approval Refresh testing can be conducted prior to product launch to maximise the product lifecycle, thus removing the time consumed with product preparation and testing by the Mobile Network Operator and Financial institution prior to product launch Refresh testing required for Issue date refresh is achieved in a short time due to limited evaluation scope at the application level A refresh evaluation easily extends the product lifecycle supported by additional security assurance As new security threats develop, the refresh approval process encourages applet level fixes resulting in the most secure and feature rich product also benefiting from a new 3 year approval Delta payment products receiving full application level testing will also benefit from a new 3 year approval period. This includes updates due to specification changes A developer managing multiple payment products on the same platform can obtain aligned approval and thus aligned expiry dates Aligned payment product expiry dates give rise to a simplified product portfolio management should further refresh evaluations or renewal evaluations be required White Paper : CAST No limit exists on the amount of refresh evaluations that can be conducted. The only requirement is that the underlying platform (specific OS on a specific IC) and the IC (Integrated Circuit) remain EMVCo maintained and approved Renewal testing remains an option for products when the platform is no longer maintained or approved by EMVCo. This may incur additional testing at the platform/IC level and would result in a 1 year extension at the application level with the option to repeat up to a maximum of 3 years (See Figure 1) Benefits for Mobile Network Operators: Product lifecycle is extended o Possible to receive up to 12 years CAST product approval o Possible for the Payment Application to remain valid in the field for up to 15 years when a 3 year application expiry is used Multiple payment products from different product developers using the same platform can obtain aligned approval and thus aligned expiry dates Aligned payment product expiry dates give rise to a simplified product portfolio management and a clear forecast for USIM (Universal Subscriber Identity Module) migration requirements Security assurance is demonstrated for products obtaining a long lifecycle Functionally updated or security patched applications benefit from a new 3 year approval thus encouraging end user migration to the latest and most feature rich payment application product Payment applet fixes/updates do not impact other application present on the product Renewal testing remains an option for products when the EMVCo platform is no longer maintained or approved. Benefits for Financial Institutions: Possible for the Payment Application to remain valid in the field for up to 15 years when a 3 year application expiry is used, this would increase further should the financial institution decide that a longer application expiry is acceptable Latest functionality enhancements and latest security applied at the applet level is received by the end user, thus benefitting from the most secure and feature rich product Confidence in 3 years product approval prior to product launch. Applications can be activated in the field for this 3 year period and the possibility of further refresh testing to obtain a new 3 year approval at any given time whilst the underlying IC and platform remain EMVCo maintained and approved. Renewal testing remains an option for products when the EMVCo platform is no longer maintained or approved. Financial institution retains control for the decision on application expiry Multiple payment applications having the same expiry date ensure aligned product migration requirements for all financial institutions. This can be either multiple payment products for a single financial institution or multiple products on the same platform from several financial institutions 2 White Paper : CAST More Details On The Process CAST Objective The CAST process requires all product vendors to submit their product to an independent CAST approved laboratory for a security evaluation. This laboratory will perform a CAST evaluation (Vulnerability analysis / Penetration testing) against the latest CAST security guidelines and submit a security evaluation report to CAST. If the product defences have been sufficiently demonstrated, the product will not have any identified security vulnerabilities and a CAST approval will be granted. CAST Approval Lifecycle Management From an end user perspective, the most important part of the CAST approval is the approval certificate number (CCN / MPCN etc) and its associated issue date. The CAST approval is valid for 3 years from the CAST approval issue date. It is therefore important that the end user understands the associated lifecycle when selecting a suitable product. It is a critical part of the CAST process that the approval date reflects the date when the evaluation work was completed as this reflects the state of the art in security testing at this point. As time progresses, attackers discover new techniques and their equipment becomes more powerful and cheaper mirroring Moore’s Law. Because of this the security of any product decreases over time. It is with this in mind that CAST will occasionally backdate an approval so the date accurately reflects exactly when the security assurance was derived. This can be for several reasons, for example: Reuse of evidence from a previous evaluation / delta review as the product is derived from a parent product / delay brought about by rework / long period between report completion and submission to CAST etc. The most common reason for backdating is due to the product being derived from an older, parent product. The introduction of Mobile Payment products has changed the way we look at security compared with the traditional smartcard model. For the traditional smartcard based bank card, the card is shipped in its final configuration to the end user, and it is not possible for the card to add further applications once it has been issued. For most of its life, when not being used to make a face to face purchase in a terminal, it remains offline in someone’s purse or wallet. For a mobile payment application to be personalised into a Secure Element (SE), the product is not in its final configuration when it is delivered to the end user. The SE needs to be able to receive applications whilst in the field. Since the SE resides in a mobile device, it is likely that the majority of its life will be spent in an environment with frequent online connectivity, even when not in a face to face payment situation. The additional complexity of these post-issuance download capable SEs has almost tripled the evaluation effort required, for example in a USIM product. However, because of its online capability, which offers the chance for more frequent updating of Mobile Payment Applications, this offers the chance to maintain the security of the product whilst in the field. 3 White Paper : CAST Leverage the EMVCo IC and Platform Approval Process The current evaluation model for a mobile payment SE product is to start with the IC evaluation and approval via EMVCo. The operating system is then loaded and evaluated through a separate EMVCo platform process. Assuming the security review is successful, the open platform approval is obtained from EMVCo. The EMVCo approval for the IC and platform is valid for 1 year, so in order to keep the IC and platform on the approved products list, a renewal evaluation must be conducted each year, for up to a maximum of 6 years. It should be noted that the IC and platform evaluation provide the majority part of the security assurance that will be reused by a composite product. CAST Applet Level Approval Loading a MasterCard payment application onto an EMVCo approved platform product will require a CAST evaluation resulting in a report submitted to the CAST team for review. If the product security defences have been sufficiently demonstrated, the product will receive the CAST approval. The CAST approval will remain valid for 3 years (Assuming a new attack is not developed that compromises the product security) after which a renewal evaluation can be performed, again, if successful, a further 1 year approval will be granted. The annual renewal process for CAST can be repeated to achieve an overall approval time of 6 years. The following figure illustrates the Application renewal timeline, where FE stands for Full security Evaluation for the new product, and DE stands for the Delta security Evaluation for the renewal of the product. Figure 1 – Application level Lifecycle New Process for Mobile Apps Note: This change applies to Mobile post issuance download platform products (also called Open platforms) only Once the CAST approval for an application level product has been obtained, it will be possible to refresh the CAST approval issue date by performing a full set of CAST testing. This means that a product that obtained its CAST approval on the 1st Jan 2014 could undergo a full CAST evaluation the following year and the CAST issue date would be brought forward to the new evaluation evidence date, 1st Jan 2015. The certificate would then be valid for 3 years from the new issue date. The only requirements are that the original evaluation laboratory must conduct the evaluation (this brings the benefit of the lab’s previous experience to the new evaluation) and the underlying platform must remain valid and approved under the EMVCo process. 4 White Paper : CAST CAST for Mobile Payment Products vs Traditional Smartcards Action Mobile Payment Product Traditional Smartcard Yearly Renewal for Platform and IC The MPP underlying platform will undergo a yearly renewal via EMVCo Once the product is evaluated and approved, no further work is usually performed to refresh the security approval of the underlying platform No Product Renewal Security Assurance Security Assurance Product Renewed Time Time Product updates in the field to accommodate new security threats The MPP is easily deleted in the event of a field issue, so the applet can be removed and replaced with a new improved applet within a very short time Products issued into the field are extremely difficult to recover and replace on a large scale should a field issue be identified New Issue date to be applied to the CAST approval for the MasterCard banking application product undertaking a refresh evaluation Full testing at the applet level will be required using the original security evaluation laboratory, this provides current evaluation evidence of which the updated issue date will be derived If the same refresh testing was to be performed for a traditional smartcard, this would not be acceptable for a CAST approval issue date refresh, the reason is related to a smartcard not being able to change the application or fix a bug for a product in the field, this brings “time in the field” as a security vulnerability back into play. Alignment of the CAST approval expiry date for a multi “payment application” product (When issuance of payment applications must cease) The alignment of product approval has been a big issue for Mobile payment products. Since a single mobile payment product can host a number of payment applications and a number of additional applications, the expiry of 1 application is not sufficient to trigger the rollout of a new mobile payment SE platform to the end user, thus alignment of the product expiry for security is required A Bank issuing traditional smartcards will generally issue with 1 payment application and a predefined set of additional application that has been evaluated as part of the CAST evaluation. The bank has total control of this product, ie: knows when the product is issued and activated. The alignment of the CAST approval expiry date is not relevant. The bank simply migrates to a new product when ready. The benefit of a single product owner Table 1 – Comparison of Smartcard and Secure Element Products 5 White Paper : CAST CAST Approval Process Example Figure 2 – New model for Mobile Payment Products As can be seen from figure 2, the IC and platform approval is possible for the full 6 years following successful yearly renewal evaluations. For Vendor 1 payment application (V1 Pay App1), the original CAST approval is obtained shortly after the EMVCo platform approval, giving rise to the 3 year CAST approval. V1 always has the option to perform a renewal evaluation at the end of the 3 years, however, as the application specifications are likely to have changed (based on our experience to date) the best course of action would be to get approval for an updated product. So by allowing the same product or variant product to have a refreshed CAST approval issue date means that Vendor 1 can get the maximum use of the underlying platform and also maximise the product life in the field. Important Note: Figure 2 above covers the approval period for a CAST approved product. Throughout the approval period, product activation in the field is permitted. Once the approval period has lapsed, product activation in the field is no longer permitted. When a product is activated in the field, the product will be personalised with an expiry date (Duration decided by the product owner), that will allow the product to remain active in the field in addition to the approval period. MasterCard recommends a 3 year application expiry period to be used. As an example in Fig 2, V1 Pay App1 is approved shortly after the platform has been approved. If after 1.5 years, the vendor performs a full application level evaluation a new CAST approval issue date is obtained. This process can be repeated so that V1 can have a 3 year product approval just before the platform and IC expire. This means that V2 and V1 now have the same approval expiry date. The application expiry date applied when personalising the product will be additional time in the field. Using this process, it can be seen that an IC can be in the field for up to 10 years plus the decided applet expiry period (usually 3 years). In fact, V1 or V2 may choose to perform a renewal evaluation to extend their CAST approval further (See Figure 1). However, although this is possible, it is considered a high risk strategy as the vendor would need to evaluate the IC, OS and application in order to extend the CAST approval. This is due to the IC and platform renewal no longer taking place, so the Application level product evaluation would need to consider this additional work. 6 White Paper : CAST CAST Approval Process Example – Security Assurance Level Figure 3 below provides an example of the security assurance derived from an EMVCo / CAST maintained product. It can be seen that the High assurance level is almost constantly maintained due to the IC renewals, Platform renewals and Applet level renewals. It is this additional assurance and the Mobile phone flexibility that gives rise to the mobile products receiving a new issue date when the refresh evaluation is achieved. High Security Assurance Medium Security Assurance Low Security Assurance 1Y 2Y 3Y 4Y 5Y 6Y 7Y 8Y 9Y 10Y 11Y 12Y 13Y Time Figure 3 – Mobile Product Security Assurance Level Figure 4 considers the SmartCard approval lifecycle when applied to Mobile payment products, showing the security assurance falling over time and reaching a low level of assurance within the applet expiry period. This threat model has been manageable for the traditional SmartCards as the product remains offline for most of its life and requires the card to be stolen to perform an attack. Comparing this to the Mobile world where the product will be online for most of its life, this amplifies the threat for logical attacks and thus requires the new approach as detailed in this document. 7 White Paper : CAST High Security Assurance Medium Security Assurance Low Security Assurance 1Y 2Y 3Y 4Y 5Y 6Y 7Y 8Y Time Figure 4 – SmartCard Product Security Assurance Level When comparing Figure 3 & 4, it can be seen that the Mobile model (Figure 3) is demonstrating High assurance after 6 years, this may have been achieved with several security patches resulting in the most secure applet being delivered to the end user. When jumping across to the SmartCard model (Figure 4), after 6 years the product is likely to have slipped into Low assurance, activation of the product is not possible and the applet in the field has exceeded its personalized expiry date therefore the banking app on this product is no longer possible. Given that applet updates have not been required over the issuance period, the product may have been vulnerable to various attacks toward the end of its lifecycle. It should be noted that Figure 3 & 4 represent a typical product and a guideline security level derived from CAST past experience. When considering the real world variety of products, the expected fall in security may be less severe or more severe than the example given. Since an accurate prediction of the fall in security over time is not possible, CAST strongly recommends a risk analysis based on fresh evaluation evidence thus providing a secure future for mobile payments. BY GARY HEMMINGS, MASTERCARD For more information on the CAST process please contact cast@mastercard.com ©2014 MasterCard. Proprietary and Confidential. All rights reserved. Advancing Commerce is a trademark of MasterCard International Incorporated. ADVANCING SECURITY ADVANCING COMMERCE 8
Source Exif Data:
File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.5 Linearized : No Page Count : 8 Language : en-GB Tagged PDF : Yes Author : Sommer, Adam Creator : Microsoft® Word 2010 Create Date : 2014:09:02 15:10:55+01:00 Modify Date : 2014:09:02 15:10:55+01:00 Producer : Microsoft® Word 2010EXIF Metadata provided by EXIF.tools